Analytics for Data at Massive Scales

The Artificial Intelligence Research Associate (AIRA) program is part of a broad DAPRA initiative to develop and apply “Third Wave” AI technologies that are robust to sparse data and adversarial spoofing, and that incorporate domain-relevant knowledge through generative contextual and explanatory models.

The Automating Scientific Knowledge Extraction (ASKE) program aims to develop technology to automate some of the manual processes of scientific knowledge discovery, curation and application. ASKE is part of DARPA's Artificial Intelligence Exploration (AIE) program, a key component of the agency’s broader AI investment strategy aimed at ensuring the United States maintains an advantage in this critical and rapidly accelerating technology area.

Expanded global access to diverse means of communication is resulting in more information being produced in more languages more quickly than ever before. The volume of information encountered by DoD, the speed at which it arrives, and the diversity of languages and media through which it is communicated make identifying and acting on relevant information a serious challenge. At the same time, there is a need to communicate with non-English-speaking local populations of foreign countries, but it is at present costly and difficult for DoD to do so.

Over the last 15 years, the U.S. military has increasingly been called upon to face complex operational environments (OE) and diverse enemies. Such complex OEs require the actions of U.S. forces and host-nation or coalition partners to be based on a common holistic understanding of the OE (e.g., governments, population groups, security forces, and violent non-state actors) and, in particular, the causal dynamics that can manifest as unanticipated and often counter-intuitive outcomes.

Networks within the United States and abroad face increasingly broad-spectrum cyber threats from numerous actors and novel attack vectors. Malicious activity also crosscuts organizational boundaries, as nefarious actors use networks with less protection to pivot into networks containing key assets. Detection of these threats requires adjustments to network and host sensors at machine speed. Additionally, the data required to detect these threats may be distributed across devices and networks. In all of these cases, the threat actors are using technology to perpetrate their attacks and hide their activities and movement, both physical and virtual, inside DoD, commercial, and Internet Access Provider (IAP) networks.

Selected DARPA Achievements

In the early days of DARPA’s work on stealth technology, Have Blue, a prototype of what would become the F-117A, first flew successfully in 1977. The success of the F-117A program marked the beginning of the stealth revolution, which has had enormous benefits for national security.

ARPA research played a central role in launching the Information Revolution. The agency developed and furthered much of the conceptual basis for the ARPANET—prototypical communications network launched nearly half a century ago—and invented the digital protocols that gave birth to the Internet.

This is an official U.S. Department of Defense website sponsored by the
Defense Advanced Research Projects
Agency.

You are now leaving the DARPA.mil website that is under the control and
management of DARPA. The appearance of hyperlinks does not constitute
endorsement by DARPA of non-U.S. Government sites or the information,
products, or services contained therein. Although DARPA may or may not
use these sites as additional distribution channels for Department of
Defense information, it does not exercise editorial control over all of
the information that you may find at these locations. Such links are
provided consistent with the stated purpose of this website.